Consider the following code segments, which are each intended to convert grades from a 100-point scale to a 4 point scale and print the result. A grade of 90 or above should yield a 4.0, a grade of 80 to 89 should yield a 3.0, grade of 70 to 79 should yield a 20, and any grade lower than 70 should yield a 0.0 Assume that grade is an int variable that has been properly declared and initialized Code Segmenti double points = 0.0; ir (grade > 89) points 4.0; else if (grade > 79) points + 3.0; else if (grade > 69) points += 2.0; else points + 0.0; System.out.println (points); Code Segment II double points - 0.0; if (grade > 89) points + 4.0; if (grade > 79) grade 3.0; if (grade > 69) points - 2.0; if (grade points + 0.01 System.out.println (points); Which of the following statements correctly compares the values printed by the two methods? A. The two code segments print the same value only when grade is below 80. B. The two code segments print the same value only when grade is 90 or above or grade is below 80. C. The two code segments print the same value only when grade is 90 or above. D. Both code segments print the same value for all possible values of grade E. The two code segments print different values for all possible values of grade.

Answers

Answer 1

Answer:

A. The two code segments print the same value only when the grade is below 80.

Explanation:

The first code segment defines a nested if-else statement with the different grade categories to compare and print and would only print one value for a given grade range. The second code segment defines several if statements for each grade range and can add multiple values to the points variable for one grade range that meets the condition.

Both code segments would only print out the same values of points for a grade range below 80.


Related Questions

A customer connects to your business network. The customer uses a packet sniffer to intercept network traffic in an attempt to find confidential information. This is an example of which type of attack

Answers

Answer:

Self Attack

Explanation:

I pick self attack because the person is trying to harm you.

which part of the federal reserve system is made up of seven federal reserve board members and five bank representatives

A) federal open market committee
B) federal reserve banks
C) federal reserve board of governors
D) federal reserve expansionary organization

Answers

Answer:

Explanation:

The answer is Federal Open Market Committee

how does a modem work​

Answers

Answer:

modem is a contraction of the words modulator-demodulator. A modem is typically used to send digital data over a phone line. The sending modem modulates the data into a signal that is compatible with the phone line, and the receiving modem demodulates the signal back into digital data.

Explanation:

Create a method named replaceCastMember that allows the name of a castMember at an index in the castMembers array to be changed. The method should take in 2 arguments, the int index and the String castMemberName. The method should return a true if the replacement was successful, false otherwise. (Note: Only update the castMember in the array if the index is valid)

Answers

Answer:

Explanation:

The following code is written in Java. It is a method that takes in the two parameters as requested and checks whether or not the index exists in the array. If it does then it replaces the String in that Index with the new castMemberName String parameter that was given. If the replacement is successful then it returns a True boolean, if not then it returns a False boolean. The array being used must be named castNames and have a global scope to be accessible by the method since it is not passed as a parameter.

public static boolean replaceCastMember(int index, String castMemberName) {

               System.out.println(castNames.size());

               if (index <= castNames.size()) {

                       castNames.remove(index);

                       castNames.add(index, castMemberName);

                       return true;

               } else {

                       return false;

               }

       }

Write a class called Dragon. A Dragon should have a name, a level, and a boolean variable, canBreatheFire, indicating whether or not the dragon can breathe fire. The class should have getter methods for all of these variables- getName, getLevel, and isFireBreather, respectively. Dragon will alsomeed a constructor, a method to gain experience, and a method to attack. The constructor should take the name as the first argument and the level as the second argument. The constructor should initialize canBreatheFire based on the dragon's level. If the dragon is level 70 or higher, the dragon can breathe fire (meaning the third member variable should be set to true). You should create three getter (accessor) methods called getNameO getLevelO,and isFireBreatherO You should also create a method called attackO. This method does not return anything. If the dragon can breathe fire, it should print >>>999 1 public class Dragon private String name; private int level; private boolean canBreatheFire; 4 7 // Write the constructor here! public String getName(name) 9 10 return name; 12 13 14 - 15 public int getLevel(level) return level; 16 17 /Put getters here 18 19 20 21 221/ String representation of the object 23 24 - 25 26 27 3 28 // Put other methods here public String toStringO return "Dragon+ name +" is at level "+ level; 1 public class DragonTester extends ConsoleProgram 2 4 6 public void runCO // Start here! 7

Answers

Answer:

public class Dragon {

private String name;

private int level;

private boolean canBreatheFire;

public Dragon(String name,int level){

this.name=name;

this.level=level;

if(level>=70) {

this.canBreatheFire=true;

}

}

public String getName() {

return name;

}

public int getLevel() {

return level;

}

public boolean getCanBreatheFire() {

return canBreatheFire;

}

public void attack() {

if(getCanBreatheFire()) {

System.out.println(">>> 999");

}else {

System.out.println("Dragon does not have fire breath.");

}

}

public void gainExperience() {

level += 5;

}

public String toString() {

return "Dragon "+ name + " is at level "+ level;

}

Explanation:

The Java program above is a class called Dragon. An object instance of the dragon class has a name and level class variable. The level is used to determine the Boolean value of the canBreathFire class variable. The variables can be retrieved with the getter methods and the level updates by the experience method.

Write two public static methods in the U6_L4_Activity_Two class. The first should have the signature swap(int[] arr, int i, int j) and return type void. This method should swap the values at the indices i and j of the array arr (precondition: i and j are both valid indices for arr). The second method should have the signature allSwap(int[] arr) and return type void. The precondition for this method is that arr has an even length. The method should swap the values of all adjacent pairs of elements in the array, so that for example the array {3, 5, 2, 1, 8, 10} becomes {5, 3, 1, 2, 10, 8} after this method is called.

Answers

Answer:

public static void swap(int[] arr, int i, int j) {

   if(i >=0 && i <=arr.length-1 && j >=0 && j<=arr.length-1){

       int hold = arr[i];

       arr[i] = arr[j];

       arr[j] = hold;

   }

}

public static void allSwap(int[] arr) {

   if (arr.length % 2 == 0){

       for(int i=0; i<arr.length; i+=2){

           int hold = arr[i+1];

           arr[i+1] = arr[i];

           arr[i] = hold;

       }

   } else{

       System.out.println("array length is not even.");

   }

}

Explanation:

The two functions, swap and allSwap are defined methods in a class. The latter swaps the item values at the specified index in an array while the second accepts an array of even length and swap the adjacent values.

____ Is an Internet service that allows users to send and receive short text messages In real time.

Answers

Answer:

SMS is the answer to this problem

The logical way tables are linked is known as the database…

A. Schema
B. Primary Key

Answers

Answer:

B Primary Key

Explanation:

I think it is Primary Key but you can just make sure

What are differences between manual formatting and formatting in word
processor?​

Answers

Answer:-

Editing refers to making quick modification to a document using editing tools such as find and replace spelling and grammar checkers,copy and paste or undo redo features. Formatting refers to changing the appearance of text in a document such as text formatting or page formatting or paragraph formatting.

Let us consider the easiest sorting algorithms – Maxsort. It works as follows: Find the largest key, say max, in the unsorted section of array (initially the whole array) and then interchange max with the element in the last position in the unsorted section. Now max is considered part of the sorted section consisting of larger keys at the end of the array. It is no longer in the unsorted section. Repeat this until the whole array is sorted. a) Write an algorithm for Maxsort assuming an array E contains n elements to be sorted, with indexes 0, 1,…,n-1. b) How many comparisons of keys does Maxsort do in the worst case and on average? Submit source code, test cases, results, and the answers to part (b)

Answers

Answer:

count = 0

for x in range(len(array)):

if count == Len(array) -1:

break

max = max(array[:-1 - count])

count += 1

if array.index(max) == -1:

break

else:

hold = array[-1]

array[-1] = max

array[array.index(max)] = hold

Explanation:

The python program is an implementation of a maxsort. The for loop iterates over the array, getting the maximum number for each reduced array and swaps it with the corresponding last items.

Sam is conducting research for a school project on the American Revolution. Which of the following kinds of software will help with research notes? music editing software word processing software presentation software spreadsheets

Answers

Answer:

Students analyze the techniques that make for good storytelling I think. :}

Explanation:

[] Hello ! []

Answer:

B. Word Processing Software

Explanation:

I hope it helped! :]

How can you reboot a laptop?
How do you get an upgrade for a tower?
Lastly, How do u get a Virus Protection.

Answers

Question: How can you reboot a laptop?

Answer: Rebooting a computer simply means to restart it. If you're using Microsoft Windows, you can click the "Start Menu," click the "Power" button and click "Restart" in the submenu to restart your computer. If you still have problems with the computer, you can also choose the "Shut Down" option in the "Power" submenu to turn the computer off altogether, let it sit for a bit and then turn it back on.

Question: How do you get an upgrade for a tower?

Answer: You can upgrade your existing Tower installation to the latest version easily. Tower looks for existing configuration files and recognizes when an upgrade should be performed instead of an installation. As with installation, the upgrade process requires that the Tower server be able to access the Internet. The upgrade process takes roughly the same amount of time as a Tower installation, plus any time needed for data migration. This upgrade procedure assumes that you have a working installation of Ansible and Tower.

Question: How do you get a Virus Protection?

Answer: Use an antimalware app - Installing an antimalware app and keeping it up to date can help defend your PC against viruses and other malware (malicious software). Antimalware apps scan for viruses, spyware, and other malware trying to get into your email, operating system, or files.

Hope this helps! :)

What is Code?
A) Rules of conduct
B) One or more commands designed to be carried out by a computer.
C) A pack between friends.
D) Edoc spelled backwords.

Answers

Answer:

In a class of statistics course, there are 50 students, of which 15 students  scored B, 25 students scored C and 10 students scored F. If a student is chosen at random from the class, what is the probability of scoring

not F?

Explanation:

Answer:

its b it's like opening multiple tabs

Write a program that takes paragraph from the user and prints all unique words in that paragraph using strings in c++

Answers

Answer:

void printUniquedWords(char filename[])

void printUniquedWords(char filename[]) {

void printUniquedWords(char filename[]) {     // Whatever your t.text file is

    fstream fs(filename);

    fstream fs(filename);   

    fstream fs(filename);       

    fstream fs(filename);           map<string, int> mp;

    fstream fs(filename);           map<string, int> mp;   

    fstream fs(filename);           map<string, int> mp;       // This serves to keep a record of the words

    string word;

    string word;     while (fs >> word)

    string word;     while (fs >> word)     {

    string word;     while (fs >> word)     {         // Verifies if this is the first time the word appears hence "unique word"

        if (!mp.count(word))

        if (!mp.count(word))             mp.insert(make_pair(word, 1));

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }   

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();   

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count     //is 1

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count     //is 1     for (map<string, int> :: iterator p = mp.begin();

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count     //is 1     for (map<string, int> :: iterator p = mp.begin();          p != mp.end(); p++)

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count     //is 1     for (map<string, int> :: iterator p = mp.begin();          p != mp.end(); p++)     {

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count     //is 1     for (map<string, int> :: iterator p = mp.begin();          p != mp.end(); p++)     {         if (p->second == 1)

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count     //is 1     for (map<string, int> :: iterator p = mp.begin();          p != mp.end(); p++)     {         if (p->second == 1)             cout << p->first << endl;

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count     //is 1     for (map<string, int> :: iterator p = mp.begin();          p != mp.end(); p++)     {         if (p->second == 1)             cout << p->first << endl;     }

        if (!mp.count(word))             mp.insert(make_pair(word, 1));         else             mp[word]++;     }       fs.close();       // Traverse map and print all words whose count     //is 1     for (map<string, int> :: iterator p = mp.begin();          p != mp.end(); p++)     {         if (p->second == 1)             cout << p->first << endl;     } }

2. Write these functions definitions:
d) Function div2Numbers () that divides 2 integers.
Compile and test your function with the following main function:
int main()
1
char op;
cout<<"Enter + to add 2 integers\n";
cout<<"Enter - to subtract 2 integers\n";
cout<<"Enter x to multiply 2 integers\n";
cout<<"Enter / to divide 2 integers\n";
cout<<"Enter the operator required: ";
cin>>op;
switch (op)
{
case '+': add2 Numbers (); break;
case '-': sub2 Numbers (); break;
case 'x' : mul2 Numbers (); break;
case '/': div2 Numbers (); break;
default: cout<<"Invalid operator entered\n";
break;
}
a) Function add2 Numbers () that adds 2 integers.
b) Function sub2 Numbers () that subtracts 2 integers.
c) Function mul2Numbers () that multiplies 2 integers.​

Answers

Answer:

Complete the code with the following code segment:

void add2Numbers(){

   int num1, num2;

   cout<<"Enter any two numbers: ";

   cin>>num1>>num2;

   cout<<num1+num2;

}

void sub2Numbers(){

   int num1, num2;

   cout<<"Enter any two numbers: ";

   cin>>num1>>num2;

   cout<<num1-num2;

}

void mul2Numbers(){

   int num1, num2;

   cout<<"Enter any two numbers: ";

   cin>>num1>>num2;

   cout<<num1*num2;

}

void div2Numbers(){

   int num1, num2;

   cout<<"Enter any two numbers: ";

   cin>>num1>>num2;

if(num2==0){

cout<<"Division by 0 is invalid";

}else{

   cout<<(float)num1/num2;}

}

Explanation:

The function added to this solution are:

add2Numberssub2Numbersmul2Numbersdiv2Numbers

Each of the functions

declares two integers num1 and num2prompt user for inputsgets user inputs from the user

For add2Numbers() function:

This line adds the two integer numbers and prints the result

   cout<<num1+num2;

For sub2Numbers() function:

This line subtracts the two integer numbers and prints the result

   cout<<num1-num2;

For mul2Numbers() function:

This line multiplies the two integer numbers and prints the result

   cout<<num1*num2;

For div2Numbers() function:

This if condtion checks if the denominator is 0

if(num2==0){

If yes, the following is printed

cout<<"Division by 0 is invalid";

If otherwise, the division is calculated and the result is printed

   cout<<(float)num1/num2;

See attachment for complete program

Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD television, fitness watch, or microwave oven. Pick one specific device and discuss how well its interface is designed and how easy it is to use. Does the device use the same techniques as computer system interfaces, such as menus and icons

Answers

Answer:

Explanation:

Different technologies use different user interface designs in order to make the user experience as easy and intuitive as possible. This varies drastically from one device to another because of the capabilities and size of each device. If we take a fitness/smart watch into consideration, this device does not use pop up menus or side scrolling menus but instead uses large full screen menus where each option nearly fills the entire screen. That is done because the smart watch screens are very small and making everything full screen makes reading and swiping through options that much easier for the user. If the user interface were the same as in a television or smartphone it would be impossible to navigate through the different options on such a tiny screen.

Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate

Answers

Answer:

Z-Wave

Explanation:

Z-WAVE can be seen as a protocol which enables home automation and home security to take place because with home automation home appliances as well as lighting , sound systems among others can be smoothly control and monitor.

Secondly Z-WAVE make uses of mesh network, allow appliances to smoothly and successful communicate with each other.

Lastly Z-WAVE which is a wireless protocols make use of data transfer rate that is low.

Therefore Z-WAVE is important because it enables wireless monitoring of home appliances to take place in a smart home.

If you have a line that is 2.5 inches in decimal, what is that in fraction form?

2 5/16 inches

2 1/4 inches

2 3/4 inches

2 1/2 inches

If you are asked to measure 9/16th on a ruler how many lines would you have to count?

Answers

Answer: 2 1/2 inches; 9 lines

Explanation:

If one has a line that is 2.5 inches in decimal, this in fraction form will be written as:

= 2.5 inches = 2 5/10 inches.

When we reduce 5/10 to its lowest term, this will be 1/2. Therefore 2.5 inches = 2 1/2 inches.

Since each mark on a ruler is 1/16, therefore 9/16 will be (9/16 ÷ 1/16) = (9/16 × 16/1) = 9 lines

Each of the following is a component of the telecommunications industry except _____.


spreadsheets

wired communications

broadcasting

HDTV

Answers

Hmmmmmmm I think it’s A.

Write a Java statement that declares and creates an array of Strings named Breeds. Your array should be large enough to hold the names of 100 dog breeds.

Answers

Answer: String[]Breeds = new String[100]

Outline three requirements for linear programming

Answers

linear programming has three major requirements: decision variables, objective function, and constraints.

why ROM is called non volatila Memory?​

Answers

Answer:

Explanation:

ROMs that are read only memory are called non volatile because all of the data that are inside it happens to not get erased after shutting down the system or computer and starting it all over again. The opposite is this phenomenon is RAM. In RAM, they are being called volatile because all of the data that are inside it happens to get erased once shutting down of the system or computer occurs and it is being restarted.

This is telling us that ROM irrespective, stores data while it is on and also while it is off, it doesn't matter. It never forgets data, unless of course, in a situation whereby it is erased.

Volatile memory stores data as long as it is powered. ROM, which stands for read-only memory, is called non-volatile memory because of they do not lose memory when power is removed. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️

apply the fade transition with smoothly effect to all slides in the presentation​

Answers

Answer:

12

Explanation:

its very long answer so that it is that

The cost of a postsecondary education increases with the length of time involved in the program.


True

False

Answers

False it stays the same hope this helps :)

By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a ________ resource that can be configured and controlled by an upper layer control plane.

Answers

Answer:

Virtual

By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a Virtual resource that can be configured and controlled by an upper layer control plane.

Explanation:

The separating data plane (SDN) is used by users to hide the specifics of a device data layer so that all devices would be treated equally thereby representing the entire data plane as a  virtual abstract layer thus enhancing network efficiency.

The SDN work mainly on the Control and data plane separating both of the planes. Also, the SDN make networks more agile and flexible.

SDN provides the flexibility to view the entire data plane infrastructure as a

virtual resource that can be configured and controlled by an upper layer

control plane.

The type of resource which makes use of SDN to control an upper layer control plane is known as:

Virtual  

Based on the given question, we are asked to state the type of resource which makes use of SDN to control an upper layer control plane and how it is viewed for it it function effectively.

With this in mind, we can see that this can only be effectively done with a virtual resource so that the separating data plane can be effective in hiding the device data layer and test the other variables.

Read more about virtual resource here:

https://brainly.com/question/2680845

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next

Answers

Answer:

Determine if escalation is needed.

Explanation:

Since in this case, it has been determined that a specific router is configured in a way that a routing loop exists, the technician would further need to determine if the following issues are persistent;

having a switching loop on the networkgeneral router problemsrouting loopif there are broadcast storms.

y'+2y = 5-e^(-4x), y(0)=-11

Use Euler's Method with a step size of h = 0.1 to find approximate values of the solution as x= 0.1, 0.2, 0.3, 0.4, and 0.5. Compare them to the exact values of the solution at these points.

Answers

Answer:

  see attached

Explanation:

A differential equation solver says the exact solution is ...

  y = 5/2 -14e^(-2x) +1/2e^(-4x)

The y-values computed by Euler's method will be ...

  y = ∆x·y' = 0.1(5 - e^(-4x) -2y)

The attached table performs these computations and compares the result. The "difference" is the approximate value minus the exact value. (When the step size is decreased by a factor of 10, the difference over the same interval is decreased by about that same factor.)

Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page. Which
markup language or technology will allow Rosa to add this element?

OA. HTML
OB. Semantic HTML
OC. DHTML
OD. XML

Answers

The answer is: OC: DHTM
Explanation: PLATOLIVESMATTER

Answer:

The correct answer is C. DHTML.

Explanation:

I got it right on the Edmentum test.

A coworker just sent you a presentation to review. You noticed that she used different types of transitions on the same slide, and the animations and videos were distracting from the topic. Give your coworker advice about guidelines she can follow when using animation, transitions, and multimedia. Be sure to include at least four guidelines

Answers

Answer:

The transitions presented should either be different on each slide or the same type but only one on each slide shown. Pictures and videos shouldnt be included a lot. At least two photos or one on each slide, while videos should only be one on the very last slide.

Explanation:

A serial schedule A. Is just theoretical and cannot be implemented in real life B. Needs the current Xact to finish before another one starts C. Is always sorted sequentially in ascending order by transaction ID D. Can have a dirty read anomaly

Answers

Answer: B. Needs the current Xact to finish before another one starts.

Explanation:

A serial schedule is a schedule whereby for a transaction to start, one must be completed first. The transactions are done one after the other.

In this case, when the cycle of a transaction have been completed, then the next transaction can begin. Therefore, the answer will be option B "needs the current Xact to finish before another one starts".

Other Questions
hi i need help for this question, what's the slope for this Nathaniel invests money in an account paying a simple interest of 6% per year. If he invests $90 and no money will be added or removed from the investment, how much will he have in one year, in dollars and cents? Describe the role of women in Texas prior to the start of the Civil War compared to after the Civil War. How do you think war in general affects the role of women in society? Do you feel the changes that occurred with the role of women in the South were positive or negative? How would my life change if I stopped using plastic? Use your brain and imagine. At a local dealership, the base price of a car is $24,300. Adding air conditioning costs an extra $725. Upgrading to a leather interior costs an extra $1,225, and installing four heated seats costs $945. Round each cost to the nearest thousand and then estimate the total cost of the car, including the additional features. A. $26,000 B. $27,000 C. $28,000 D. $29,000 Which measurement is most likely to be the mass of a strawberry? Please help..Give a example of force applied to an object that dies not change the objects's velocity. The temperature of 25 g of water was raised from 10 oC to 60 oC. How many joules of heat was necessary to accomplish this? need ASAP WILL MARK BRANLIEST Which type of disease can be reduced by fitness walking? heart O ocular kidney lung How does the author create imagery in the poem The Red Wheelbarrow" ?so much dependsuponthe red wheelbarrowglazed in rainwaterbeside the whitechickensBy using similes and metaphorsBy using random line breaksBy describing life on the farmBy using specific colors and clear word choiced On January 1, 2019, Woodstock, Inc. purchased a machine costing $30,900. Woodstock also paid $1,700 for transportation and installation. The expected useful life of the machine is 5 years and the residual value is $4,600. How much is the annual depreciation expense, assuming use of the straight-line depreciation method Which sentence best paraphrases the passage? Swift has been wearied out for many years and wants to incur no danger in dsiobliging England. Swift offers a harsh critique of England and points out the many ways that the English dehumanize the Irish. Swift says that after much time and effort, he was finally able to come up with a viable solution to the problem of poverty. A computer that cost 1099 last year cost 9999 this year. What is the percent change in price rounded to the nearest tenth 1%0.1%9.1 %10 % please help ill give you brainliest!!!!! P partitions GR in ratio 2:4. GR is 36cm. How long is GP and PR? which mountain range lies to the northern Northeast of India Do political parties tend to either Unify or divide the American people? 2 + 4.What is the answer? Which property of loss is caused by the natural disasters